Cyber News

Amazon Web Services (AWS) is the most significant player in the cloud, holding an astonishing 45% of the industry market share. Given this, there is a huge demand for experts in AWS cloud experts. The latest Salary Survey from CertMag.com proves that AWS professionals can make substantial salaries. The AWS Certified Solutions Architect certification is … Read more

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers. These hotels include Sheraton, Aloft, W Hotels, and Westin Hotels. Marriott acquired the Starwood Group back in 2016, but the compromise started way back in 2014 before the acquisition took place. Hackers had full access for four years … Read more

It is usually not a good idea for lawmakers to get involved in cybersecurity beyond a certain point. The reason for this is that lawmakers do not have an understanding of the technology that they are legislating. Case in point: Australia is quickly enacting legislation that will require companies like Apple and Facebook to provide … Read more

Why Passwords Suck Usernames and Passwords are not secure by nature. Usernames and Passwords are controls that rely on “Something you know.” Knowledge is easily transferable, and therefore, passwords are not secure. No amount of security training will eliminate or overcome human nature. It is human nature to make passwords we can easily remember. Passwords … Read more

The Dark Web is Anonymous The dark web is a scary place. It is a network of websites teeming with illegal activity. It is a secret place where visitors protect their identity by using techniques to keep identifying information (Like their IP address) hidden. There are several methods that people use to keep themselves anonymous … Read more

Hardware Encryption is not Secure A Little History… In the past, it was assumed that hardware encryption is far more secure than software encryption. Many people, including security experts, still believe this to be true. And in the past, it was true. But recent history has proven that hardware encryption is highly vulnerable. The widely … Read more

When Hackers Kill Hackers have already – perhaps many times- have contributed to death by hacking into secure systems and releasing information. This information has lead to loss of life in many different ways, including suicide and murder. But hacking has now evolved to the point that cybercriminals can use computers to negatively affect and … Read more

Zerodium is a reputable place where you can sell zero-day exploits. Hackers and security researchers know that Zerodium is a way to cash in on vulnerabilities that they discover in operation systems, software and hardware, and devices. There are several ways that you can make money from discovering vulnerabilities. You can disclose the vulnerability to … Read more

Persian Stalker is targeting Iranian social media accounts. The “group” has been around since 2017, and they have been observed targeting social media accounts. Specifically, this group focuses on gaining access and control of Instagram and Telegram accounts. Telegram is a popular service with about 40 million users. Telegram is a communication app that has … Read more

According to “The Retail and eCommerce Threat Landscape Report” from October 2018, there is a 297% increase in the number of phishing websites that target online retail businesses and customers of these businesses. There is an average of 23 phishing sites for each retail company included in the study. In 2017 the data showed that … Read more

Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea’s burgeoning cyber military seems to have especially honed its assault abilities to attack cryptocurrency-related organizations. In the face of mounting and crippling international sanctions, Pyongyang’s many hacker groups have adopted cryptocurrency-focused malicious attempts as an … Read more

Everyone is talking about the Bloomberg Businessweek’s volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report is not standing up to the smell test. As president Trump would say – This is fake news. Apple, Amazon, and the other involved parties delivered strong denials. If these … Read more